Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

Padlock
electric meter meter electricity power residential costs 000000662277

linux penguins arguing

Grsecurity will stop issuing patches citing trademark abuse

A major corporation is misusing grsecurity’s trademarks and violating the terms of the GNU Public License – and as a consequence, the leader of the project said Wednesday, grsecurity will stop making its stable patches available to...

privacycon logo final nodrone

Attention whitehats, The FTC wants you to lead new privacy, security push

The FTC’s PrivacyCon will include brief privacy and security research presentations, along with expert panel discussions on the latest privacy and security challenges facing consumers. Whitehat researchers and academics will discuss...

wifi blocking 2

Wi-Fi blocking debate far from over

Following the FCC’s warning in January that it would no longer tolerate the Marriotts of the world blocking visitors’ WiFi hotspots, I set a reminder on my calendar to revisit the topic six months later. After all, the issue of WiFi...

A new version of the sophisticated Duqu malware is used for spying

Researchers find many more modules of Regin spying tool

Security researchers from Symantec have identified 49 more modules of the sophisticated Regin cyberespionage platform that many believe is used by the U.S. National Security Agency and its close allies.

making the case security

Law firm makes a case for security certification

A big law firm handling sensitive documents uses its ISO security certification as a competitive differentiator
.

Google to freeze some Adobe Flash content on Sept. 1

Google will stop some Flash content from automatically playing starting Sept. 1, a move it decided on earlier this year to improve browser performance.

Vidder's Software Defined Perimeter puts tight security around high value assets

Reducing the surface that needs to be protected to a single application, it's easier to apply very tight controls through Software Defined Perimeter techniques.

alias1

The ultimate auto-pilot software gets $15M boost

DARPA says the Aircrew Labor In-Cockpit Automation System or ALIAS program, which was announced in 2014 envisions a tailorable, drop-in, removable software kit that allows the addition of high levels of automation into existing...

Security in cloud computing

BitTorrent patches flaw that could amplify distributed denial-of-service attacks

BitTorrent fixed a vulnerability that would have allowed attackers to hijack BitTorrent applications used by hundreds of millions of users in order to amplify distributed denial-of-service (DDoS) attacks.

Researchers find holes in routers supplied by ISPs

Some routers vulnerable to remote hacking due to hard-coded admin credentials

Several DSL routers from different manufacturers contain a guessable hard-coded password that allows accessing the devices with a hidden administrator account.

healthcare it security jobs

More than 80% of healthcare IT leaders say their systems have been compromised

A survey of IT leaders in healthcare revealed that 81% of them believe their systems have been compromised by at least one malware, botnet or some other cyber-attack in the past two years, placing patient sensitive data at risk.

Internet of Things hack security smart home

Smart refrigerator hack exposes Gmail login credentials

A Samsung smart refrigerator designed to integrate Gmail Calendar information has a vulnerability that could allow hackers to steal Gmail user names and passwords.

Fraud gang targeted large European companies

Tor security concerns prompt largest dark market to suspend operations

Administrators of Agora, the largest online black marketplace operating on the Tor anonymity network, decided to temporarily suspend the website because of possible attacks based on recent methods of exposing Tor Hidden Services.

measure piece photo

4 security metrics that matter

Today, management demands metrics to get a clearer view of security. Here are four metrics that deliver actionable insight -- and a few others with less value

hostess dinner party server

When to host your Website's security

Managing the daily updates and upgrades needed to keep the website secure demands a highly skilled administration team.

too close darwin award

Most corporate risk due to just 1% of employees

Just 1 percent of employees are responsible for 75 percent of cloud-related enterprise security risk, and companies can dramatically reduce their exposure at very little additional cost by paying extra attention to these users.

AT&T Wi-Fi hotspot reportedly stuffs extra ads into Web pages

Stanford computer scientist Jonathan Mayer was recently Web browsing at a U.S. airport when he reportedly noticed there were too many online advertisements.

Dell Oro Group: Check Point, Fortinet, Palo Alto making gains in security appliances

There’s a shift among the top security vendors that has Cisco remaining at the top of the heap but with Check Point Software, Fortinet and Palo Alto Networks making gains and pressuring Juniper Networks, according to new research from...

Load More